Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Understanding Privacy Risks and Perceived Benefits in Open Dataset Collection for Mobile Affective Computing

Published: 07 July 2022 Publication History

Abstract

Collecting large-scale mobile and wearable sensor datasets from daily contexts is essential in developing machine learning models for enabling everyday affective computing applications. However, there is a lack of knowledge on data contributors' perceived benefits and risks in participating in open dataset collection projects. To bridge this gap, we conducted an in-situ study on building an open dataset with mobile and wearable devices for affective computing research (N = 100, 4 weeks). Our study results showed that a mixture of financial and altruistic benefits was important in eliciting data contribution. Sensor-specific risks were largely associated with the revelation of personal traits and social behaviors. However, most of the participants were less concerned with open dataset collection and their perceived sensitivity of each sensor data did not change over time. We further discuss alternative approaches to promote data contributors' motivations and suggest design guidelines to alleviate potential privacy concerns in mobile open dataset collection.

References

[1]
Mojtaba Khomami Abadi, Ramanathan Subramanian, Seyed Mostafa Kia, Paolo Avesani, Ioannis Patras, and Nicu Sebe. 2015. DECAF: MEG-based multimodal database for decoding affective physiological responses. IEEE Transactions on Affective Computing 6, 3 (2015), 209--222.
[2]
Gregory D Abowd, Anind K Dey, Peter J Brown, Nigel Davies, Mark Smith, and Pete Steggles. 1999. Towards a better understanding of context and context-awareness. In International symposium on handheld and ubiquitous computing. Springer, New York, NY, USA, 304--307.
[3]
Mark S Ackerman, Lorrie Faith Cranor, and Joseph Reagle. 1999. Privacy in e-commerce: examining user scenarios and privacy preferences. In Proceedings of the 1st ACM Conference on Electronic Commerce. ACM, New York, NY, USA, 1--8.
[4]
Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE security & privacy 3, 1 (2005), 26--33.
[5]
Alessandro Acquisti, Leslie K John, and George Loewenstein. 2013. What is privacy worth? The Journal of Legal Studies 42, 2 (2013), 249--274.
[6]
Unai Alegre, Juan Carlos Augusto, and Tony Clark. 2016. Engineering context-aware systems and applications: A survey. Journal of Systems and Software 117 (2016), 55--83.
[7]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In Proceedings of the 33rd annual ACM conference on human factors in computing systems. ACM, New York, NY, USA, 787--796.
[8]
Andy Alorwu, Saba Kheirinejad, Niels van Berkel, Marianne Kinnula, Denzil Ferreira, Aku Visuri, and Simo Hosio. 2021. Assessing MyData Scenarios: Ethics, Concerns, and the Promise. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 1--11.
[9]
Abdulmajeed Alqhatani and Heather Richter Lipford. 2019. "There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness Data. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). 421--434.
[10]
appleheart. 2021. appleheart. https://med.stanford.edu/appleheartstudy.html
[11]
Mehrdad Bahrini, Nina Wenig, Marcel Meissner, Karsten Sohr, and Rainer Malaka. 2019. HappyPerMi: Presenting critical data flows in mobile application to raise user security awareness. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--6.
[12]
Oresti Baños, Miguel Damas, Héctor Pomares, Ignacio Rojas, Máté Attila Tóth, and Oliver Amft. 2012. A benchmark dataset to evaluate sensor displacement in activity recognition. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. 1026--1035.
[13]
C Daniel Batson, Nadia Ahmad, and Jo-Ann Tsang. 2002. Four motives for community involvement. Journal of social issues 58, 3 (2002), 429--445.
[14]
Elizabeth A Bell, Lucila Ohno-Machado, and M Adela Grando. 2014. Sharing my health data: a survey of data sharing preferences of healthy individuals. In AMIA annual symposium proceedings, Vol. 2014. American Medical Informatics Association, 1699.
[15]
Dror Ben-Zeev, Emily A Scherer, Rui Wang, Haiyi Xie, and Andrew T Campbell. 2015. Next-generation psychiatric assessment: Using smartphone sensors to monitor behavior and mental health. Psychiatric rehabilitation journal 38, 3 (2015), 218.
[16]
Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences: Privacy and the control paradox. Social psychological and personality science 4, 3 (2013), 340--347.
[17]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77--101.
[18]
Luca Canzian and Mirco Musolesi. 2015. Trajectories of depression: unobtrusive monitoring of depressive states by means of smartphone mobility traces analysis. In Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing. 1293--1304.
[19]
Delphine Christin. 2016. Privacy in mobile participatory sensing: Current trends and future challenges. Journal of Systems and Software 116 (2016), 57--68.
[20]
Sheldon Cohen, Tom Kamarck, and Robin Mermelstein. 1983. A global measure of perceived stress. Journal of health and social behavior (1983), 385--396.
[21]
Sunny Consolvo, David W McDonald, Tammy Toscos, Mike Y Chen, Jon Froehlich, Beverly Harrison, Predrag Klasnja, Anthony LaMarca, Louis LeGrand, Ryan Libby, et al. 2008. Activity sensing in the wild: a field trial of ubifit garden. In Proceedings of the SIGCHI conference on human factors in computing systems. 1797--1806.
[22]
Martin Cooney, Sepideh Pashami, Anita Sant'Anna, Yuantao Fan, and Slawomir Nowaczyk. 2018. Pitfalls of Affective Computing: How can the automatic visual communication of emotions lead to harm, and what can be done to mitigate such risks. In Companion Proceedings of the The Web Conference 2018. 1563--1566.
[23]
Yves-Alexandre de Montjoye, Jordi Quoidbach, Florent Robic, and Alex Sandy Pentland. 2013. Predicting personality using novel mobile phone-based metrics. In International conference on social computing, behavioral-cultural modeling, and prediction. Springer, New York, NY, USA, 48--55.
[24]
Mohammad Omar Derawi, Claudia Nickel, Patrick Bours, and Christoph Busch. 2010. Unobtrusive user-authentication on mobile phones using biometric gait recognition. In 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 306--311.
[25]
Anind K Dey. 2001. Understanding and using context. Personal and ubiquitous computing 5, 1 (2001), 4--7.
[26]
Nathan Eagle and Alex Sandy Pentland. 2006. Reality mining: sensing complex social systems. Personal and ubiquitous computing 10, 4 (2006), 255--268.
[27]
Nico Ebert, Kurt Alexander Ackermann, and Björn Scheppler. 2021. Bolder is Better: Raising User Awareness through Salient and Concise Privacy Notices. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--12.
[28]
Anja Exler, Andrea Schankin, Christoph Klebsattel, and Michael Beigl. 2016. A wearable system for mood assessment considering smartphone features and data from mobile ECGs. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct. ACM, New York, NY, USA, 1153--1161.
[29]
Asma Ahmad Farhan, Chaoqun Yue, Reynaldo Morillo, Shweta Ware, Jin Lu, Jinbo Bi, Jayesh Kamath, Alexander Russell, Athanasios Bamis, and Bing Wang. 2016. Behavior vs. introspection: refining prediction of clinical depression via smartphone sensing data. In 2016 IEEE Wireless Health (WH). IEEE, 1--8.
[30]
Jon Froehlich, Mike Y Chen, Sunny Consolvo, Beverly Harrison, and James A Landay. 2007. MyExperience: a system for in situ tracing and capturing of user feedback on mobile phones. In Proceedings of the 5th international conference on Mobile systems, applications and services. 57--70.
[31]
Sandra Gabriele and Sonia Chiasson. 2020. Understanding fitness tracker users' security and privacy knowledge, attitudes and behaviours. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--12.
[32]
Nanna Gorm and Irina Shklovski. 2016. Sharing steps in the workplace: Changing privacy concerns over time. In proceedings of the 2016 CHI conference on human factors in computing systems. 4315--4319.
[33]
Agnes Grünerbl, Amir Muaremi, Venet Osmani, Gernot Bahle, Stefan Oehler, Gerhard Tröster, Oscar Mayora, Christian Haring, and Paul Lukowicz. 2014. Smartphone-based recognition of states and state changes in bipolar disorder patients. IEEE Journal of Biomedical and Health Informatics 19, 1 (2014), 140--148.
[34]
Gabriella M Harari, Samuel D Gosling, RUI Wang, and Andrew T Campbell. 2015. Capturing situational information with smartphones and mobile sensing methods. European Journal of Personality 29, 5 (2015), 509--511.
[35]
Geert Hofstede, Gert Jan Hofstede, and Michael Minkov. 2005. Cultures and organizations: Software of the mind. Vol. 2. Mcgraw-hill New York.
[36]
Karen Hovsepian, Mustafa al'Absi, Emre Ertin, Thomas Kamarck, Motohiro Nakajima, and Santosh Kumar. 2015. cStress: towards a gold standard for continuous stress assessment in the mobile environment. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, New York, NY, USA, 493--504.
[37]
Bernardo A Huberman, Eytan Adar, and Leslie R Fine. 2005. Valuating privacy. IEEE security & privacy 3, 5 (2005), 22--25.
[38]
Princely Ifinedo. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security 31, 1 (2012), 83--95.
[39]
Thomas R Insel. 2017. Digital phenotyping: technology for a new science of behavior. Jama 318, 13 (2017), 1215--1216.
[40]
Corey Brian Jackson and Yang Wang. 2018. Addressing the privacy paradox through personalized privacy notifications. Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies 2, 2 (2018), 1--25.
[41]
Luis G Jaimes, Idalides J Vergara-Laurens, and Andrew Raij. 2015. A survey of incentive techniques for mobile crowd sensing. IEEE Internet of Things Journal 2, 5 (2015), 370--380.
[42]
Matthew Kay, Eun Kyoung Choe, Jesse Shepherd, Benjamin Greenstein, Nathaniel Watson, Sunny Consolvo, and Julie A Kientz. 2012. Lullaby: a capture & access system for understanding the sleep environment. In Proceedings of the 2012 ACM conference on ubiquitous computing. 226--234.
[43]
Jane Kaye, Edgar A Whitley, David Lund, Michael Morrison, Harriet Teare, and Karen Melham. 2015. Dynamic consent: a patient interface for twenty-first century research networks. European journal of human genetics 23, 2 (2015), 141--146.
[44]
Ji-Hyeon Kim, Bok-Hwan Kim, and Moon-Sun Ha. 2011. Validation of a Korean version of the Big Five Inventory. Journal of Human Understanding and Counseling 32, 1 (2011), 47--65.
[45]
Seoyoung Kim, Arti Thakur, and Juho Kim. 2020. Understanding Users' Perception Towards Automated Personality Detection with Group-specific Behavioral Data. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--12.
[46]
David M Kreps. 1997. Intrinsic motivation and extrinsic incentives. The American economic review 87, 2 (1997), 359--364.
[47]
Kurt Kroenke, Robert L Spitzer, and Janet BW Williams. 2001. The PHQ-9: validity of a brief depression severity measure. Journal of general internal medicine 16, 9 (2001), 606--613.
[48]
Todd Kulesza, Simone Stumpf, Margaret Burnett, Sherry Yang, Irwin Kwan, and Weng-Keen Wong. 2013. Too much, too little, or just right? Ways explanations impact end users' mental models. In 2013 IEEE Symposium on visual languages and human centric computing. IEEE, 3--10.
[49]
Jennifer R Kwapisz, Gary M Weiss, and Samuel A Moore. 2011. Activity recognition using cell phone accelerometers. ACM SigKDD Explorations Newsletter 12, 2 (2011), 74--82.
[50]
Reed Larson and Mihaly Csikszentmihalyi. 1983. The Experience Sampling Method. New Directions for Methodology of Social & Behavioral Science (1983).
[51]
Hyunsoo Lee and Uichin Lee. 2021. Dynamic Consent for Sensor-Driven Research. In 2021 Thirteenth International Conference on Mobile Computing and Ubiquitous Network (ICMU). IEEE, 1--6.
[52]
Ja-Young Lee, Suk-Kyung Nam, Mi-Kyoung Lee, Ji-Hee Lee, and SM Lee. 2009. Rosenberg'self-esteem scale: analysis of item-level validity. Korean J Couns Psychother 21, 1 (2009), 173--189.
[53]
Uichin Lee, Jihyoung Kim, Eunhee Yi, Juyup Sung, and Mario Gerla. 2013. Analyzing crowd workers in mobile pay-for-answer q&a. In Proceedings of the SIGCHI conference on human factors in computing systems. 533--542.
[54]
Robert LiKamWa, Yunxin Liu, Nicholas D Lane, and Lin Zhong. 2013. Moodscope: Building a mood sensor from smartphone usage patterns. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, New York, NY, USA, 389--402.
[55]
TH Lim. 2014. Validation of the korean version of positive psychological capital (K-PPC). Journal of coaching development 16, 3 (2014), 157--166.
[56]
Young Jin Lim. 2012. Psychometric properties of the satisfaction with life scale among Korean police officers, university students, and adolescents. Korean Journal of Psychology: General 31, 3 (2012), 877--896.
[57]
Chang Liu, Jack T Marchewka, June Lu, and Chun-Sheng Yu. 2005. Beyond concern---a privacy-trust-behavioral intention model of electronic commerce. Information & Management 42, 2 (2005), 289--304.
[58]
Byron Lowens, Vivian Genaro Motti, and Kelly Caine. 2017. Wearable privacy: Skeletons in the data closet. In 2017 IEEE international conference on healthcare informatics (ICHI). IEEE, 295--304.
[59]
A Lundin, M Hallgren, H Theobald, C Hellgren, and Margareta Torgén. 2016. Validity of the 12-item version of the General Health Questionnaire in detecting depression in the general population. Public health 136 (2016), 66--74.
[60]
Stephen M Mattingly, Julie M Gregg, Pino Audia, Ayse Elvan Bayraktaroglu, Andrew T Campbell, Nitesh V Chawla, Vedant Das Swain, Munmun De Choudhury, Sidney K D'Mello, Anind K Dey, et al. 2019. The Tesserae project: Large-scale, longitudinal, in situ, multimodal sensing of information workers. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--8.
[61]
Abhinav Mehrotra, Fani Tsapeli, Robert Hendley, and Mirco Musolesi. 2017. MyTraces: Investigating Correlation and Causation between Users' Emotional States and Mobile Phone Interaction. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 83.
[62]
David L Mothersbaugh, William K Foxx, Sharon E Beatty, and Sijun Wang. 2012. Disclosure antecedents in an online service context: The role of sensitivity of information. Journal of service research 15, 1 (2012), 76--98.
[63]
Vivian Genaro Motti and Kelly Caine. 2015. Users' privacy concerns about wearables. In International Conference on Financial Cryptography and Data Security. Springer, New York, NY, USA, 231--244.
[64]
Mohamed Musthag, Andrew Raij, Deepak Ganesan, Santosh Kumar, and Saul Shiffman. 2011. Exploring micro-incentive strategies for participant compensation in high-burden studies. In Proceedings of the 13th international conference on Ubiquitous computing. 435--444.
[65]
Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 399--412.
[66]
Jennifer Nicholas, Katie Shilton, Stephen M Schueller, Elizabeth L Gray, Mary J Kwasny, and David C Mohr. 2019. The role of data type and recipient in individuals' perspectives on sharing passively collected smartphone data for mental health: Cross-sectional questionnaire study. JMIR mHealth and uHealth 7, 4 (2019), e12578.
[67]
Patricia A Norberg, Daniel R Horne, and David A Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of consumer affairs 41, 1 (2007), 100--126.
[68]
Jill M Oliver, MJ Slashinski, T Wang, PA Kelly, SG Hilsenbeck, and AL McGuire. 2012. Balancing the risks and benefits of genomic data sharing: genome research participants' perspectives. Public health genomics 15, 2 (2012), 106--114.
[69]
Jukka-Pekka Onnela and Scott L Rauch. 2016. Harnessing smartphone-based digital phenotyping to enhance behavioral and mental health. Neuropsychopharmacology 41, 7 (2016), 1691--1696.
[70]
Cheul Young Park, Narae Cha, Soowon Kang, Auk Kim, Ahsan Habib Khandoker, Leontios Hadjileontiadis, Alice Oh, Yong Jeong, and Uichin Lee. 2020. K-EmoCon, a multimodal sensor dataset for continuous emotion recognition in naturalistic conversations. Scientific Data 7, 1 (2020), 1--16.
[71]
Sangkeun Park, Joohyun Kim, Rabeb Mizouni, and Uichin Lee. 2016. Motives and concerns of dashcam video sharing. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 4758--4769.
[72]
Eyal Peer, Serge Egelman, Marian Harbach, Nathan Malkin, Arunesh Mathur, and Alisa Frik. 2020. Nudge me right: Personalizing online security nudges to people's decision-making styles. Computers in Human Behavior 109 (2020), 106347.
[73]
Chanda Phelan, Cliff Lampe, and Paul Resnick. 2016. It's creepy, but it doesn't bother me. In Proceedings of the 2016 CHI conference on human factors in computing systems. 5240--5251.
[74]
Svenja Pieritz, Mohammed Khwaja, A Aldo Faisal, and Aleksandar Matic. 2021. Personalised Recommendations in Mental Health Apps: The Impact of Autonomy and Data Sharing. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--12.
[75]
Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, and David Kotz. 2012. Understanding sharing preferences and behavior for mHealth devices. In Proceedings of the 2012 ACM workshop on Privacy in the electronic society. 117--128.
[76]
Sasank Reddy, Deborah Estrin, Mark Hansen, and Mani Srivastava. 2010. Examining micro-payments for participatory sensing data collections. In Proceedings of the 12th ACM international conference on Ubiquitous computing. 33--36.
[77]
Ronald W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 (1975), 93--114.
[78]
John Rooksby, Alistair Morrison, and Dave Murray-Rust. 2019. Student perspectives on digital phenotyping: The acceptability of using smartphone data to assess mental health. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--14.
[79]
Dominik Rüegger, Mirjam Stieger, Marcia Nißen, Mathias Allemand, Elgar Fleisch, and Tobias Kowatsch. 2020. How are personality states associated with smartphone data? European Journal of Personality 34, 5 (2020), 687--713.
[80]
Sohrab Saeb, Mi Zhang, Christopher J Karr, Stephen M Schueller, Marya E Corden, Konrad P Kording, and David C Mohr. 2015. Mobile phone sensor correlates of depressive symptom severity in daily-life behavior: an exploratory study. Journal of medical Internet research 17, 7 (2015), e175.
[81]
Maude Schneider, Thomas Vaessen, Esther DA van Duin, Zuzana Kasanova, Wolfgang Viechtbauer, Ulrich Reininghaus, Claudia Vingerhoets, Jan Booij, Ann Swillen, Jacob AS Vorstman, et al. 2020. Affective and psychotic reactivity to daily-life stress in adults with 22q11DS: a study using the experience sampling method. Journal of Neurodevelopmental Disorders 12, 1 (2020), 1--11.
[82]
Nisha Shah, Victoria Coathup, Harriet Teare, Ian Forgie, Giuseppe Nicola Giordano, Tue Haldor Hansen, Lenka Groeneveld, Michelle Hudson, Ewan Pearson, Hartmut Ruetten, et al. 2019. Motivations for data sharing---views of research participants from four European countries: a DIRECT study. European Journal of Human Genetics 27, 5 (2019), 721--729.
[83]
Ruth Shillair, Shelia R Cotten, Hsin-Yi Sandy Tsai, Saleem Alhabash, Robert LaRose, and Nora J Rifon. 2015. Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior 48 (2015), 199--207.
[84]
Sarah Spiekermann, Jens Grossklags, and Bettina Berendt. 2001. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In Proceedings of the 3rd ACM conference on Electronic Commerce. 38--47.
[85]
Peter M Steiner, Thomas D Cook, William R Shadish, and Margaret H Clark. 2010. The importance of covariate selection in controlling for selection bias in observational studies. Psychological methods 15, 3 (2010), 250.
[86]
Artem Timoshenko and John R Hauser. 2019. Identifying customer needs from user-generated content. Marketing Science 38, 1 (2019), 1--20.
[87]
John Torous, Hannah Wisniewski, Bruce Bird, Elizabeth Carpenter, Gary David, Eduardo Elejalde, Dan Fulford, Synthia Guimond, Ryan Hays, Philip Henson, et al. 2019. Creating a digital health smartphone app and digital phenotyping platform for mental health and diverse healthcare needs: an interdisciplinary and collaborative approach. Journal of Technology in Behavioral Science 4, 2 (2019), 73--85.
[88]
Tammy Toscos, Anne Faber, Shunying An, and Mona Praful Gandhi. 2006. Chick clique: persuasive technology to motivate teenage girls to exercise. In Extended Abstracts of the 2006 CHI Conference on Human Factors in Computing Systems. 1873--1878.
[89]
Yonatan Vaizman, Katherine Ellis, and Gert Lanckriet. 2017. Recognizing detailed human context in the wild from smartphones and smartwatches. IEEE pervasive computing 16, 4 (2017), 62--74.
[90]
Yonatan Vaizman, Katherine Ellis, Gert Lanckriet, and Nadir Weibel. 2018. Extrasensory app: Data collection in-the-wild with rich user interface to self-report behavior. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--12.
[91]
René van Bavel, Nuria Rodríguez-Priego, José Vila, and Pam Briggs. 2019. Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies 123 (2019), 29--39.
[92]
Paul Voigt and Axel Von dem Bussche. 2017. The eu general data protection regulation (gdpr). A Practical Guide, 1st Ed., Cham: Springer International Publishing 10 (2017), 3152676.
[93]
Daniel T Wagner, Andrew Rice, and Alastair R Beresford. 2014. Device Analyzer: Large-scale mobile data collection. ACM SIGMETRICS Performance Evaluation Review 41, 4 (2014), 53--56.
[94]
Fabian Wahle, Lea Bollhalder, Tobias Kowatsch, and Elgar Fleisch. 2017. Toward the design of evidence-based mental health information systems for people with depression: a systematic literature review and meta-analysis. Journal of medical internet research 19, 5 (2017), e191.
[95]
Fabian Wahle, Tobias Kowatsch, Elgar Fleisch, Michael Rufer, and Steffi Weidt. 2016. Mobile sensing and support for people with depression: a pilot trial in the wild. JMIR mHealth and uHealth 4, 3 (2016), e5960.
[96]
Julie B Wang, Jeffrey E Olgin, Gregory Nah, Eric Vittinghoff, Janine K Cataldo, Mark J Pletcher, and Gregory M Marcus. 2018. Cigarette and e-cigarette dual use and risk of cardiopulmonary symptoms in the Health eHeart Study. PloS one 13, 7 (2018), e0198681.
[97]
Rui Wang, Fanglin Chen, Zhenyu Chen, Tianxing Li, Gabriella Harari, Stefanie Tignor, Xia Zhou, Dror Ben-Zeev, and Andrew T Campbell. 2014. StudentLife: assessing mental health, academic performance and behavioral trends of college students using smartphones. In Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing. 3--14.
[98]
Rui Wang, Gabriella Harari, Peilin Hao, Xia Zhou, and Andrew T Campbell. 2015. SmartGPA: how smartphones can assess and predict academic performance of college students. In Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing. 295--306.
[99]
Rui Wang, Weichen Wang, Alex DaSilva, Jeremy F Huckins, William M Kelley, Todd F Heatherton, and Andrew T Campbell. 2018. Tracking depression dynamics in college students using mobile phone and wearable sensing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 1 (2018), 1--26.
[100]
Raf Widdershoven, Marieke Wichers, Peter Kuppens, Jessica Hartmann, Claudia Menne-Lothmann, Claudia Simons, and Jojanneke Bastiaansen. 2019. Effect of self-monitoring through experience sampling on emotion differentiation in depression. Journal of Affective Disorders (2019), 71--77.
[101]
Michael Workman, William H Bommer, and Detmar Straub. 2008. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in human behavior 24, 6 (2008), 2799--2816.
[102]
Heng Xu, Tamara Dinev, H Jeff Smith, and Paul Hart. 2008. Examining the formation of individual's privacy concerns: Toward an integrative view. (2008).
[103]
Heng Xu, Sumeet Gupta, Mary Beth Rosson, and John M Carroll. 2012. Measuring mobile users' concerns for information privacy. (2012).
[104]
Xuhai Xu, Prerna Chikersal, Afsaneh Doryab, Daniella K Villalba, Janine M Dutcher, Michael J Tumminia, Tim Althoff, Sheldon Cohen, Kasey G Creswell, J David Creswell, et al. 2019. Leveraging routine behavior and contextually-filtered features for depression detection among college students. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 1--33.
[105]
Seounmi Youn. 2005. Teenagers' perceptions of online privacy and coping behaviors: a risk-benefit appraisal approach. Journal of Broadcasting & Electronic Media 49, 1 (2005), 86--110.
[106]
Xinglin Zhang, Zheng Yang, Wei Sun, Yunhao Liu, Shaohua Tang, Kai Xing, and Xufei Mao. 2015. Incentives for mobile crowd sensing: A survey. IEEE Communications Surveys & Tutorials 18, 1 (2015), 54--67.
[107]
Mingmin Zhao, Fadel Adib, and Dina Katabi. 2016. Emotion recognition using wireless signals. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking. 95--108.
[108]
Yixin Zou and Florian Schaub. 2018. Concern But No Action: Consumers' Reactions to the Equifax Data Breach. In Extended abstracts of the 2018 CHI conference on human factors in computing systems. 1--6.

Cited By

View all
  • (2024)Evaluating the Privacy Valuation of Personal Data on SmartphonesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785098:3(1-33)Online publication date: 9-Sep-2024
  • (2024)Wearable Activity Trackers: A Survey on Utility, Privacy, and SecurityACM Computing Surveys10.1145/364509156:7(1-40)Online publication date: 9-Apr-2024
  • (2024)FamilyScope: Visualizing Affective Aspects of Family Social Interactions using Passive Sensor DataProceedings of the ACM on Human-Computer Interaction10.1145/36373348:CSCW1(1-27)Online publication date: 26-Apr-2024
  • Show More Cited By

Index Terms

  1. Understanding Privacy Risks and Perceived Benefits in Open Dataset Collection for Mobile Affective Computing

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
      Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 6, Issue 2
      July 2022
      1551 pages
      EISSN:2474-9567
      DOI:10.1145/3547347
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 July 2022
      Published in IMWUT Volume 6, Issue 2

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Affective Computing
      2. Mobile and Wearable Computing
      3. Open Dataset
      4. Privacy
      5. Risk-Benefit Assessment

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • Basic Science Research Program through the National Research Foundation (NRF) funded by the Korean government (MSIT)
      • Bio & Medical Technology Development Program of the National Research Foundation (NRF) funded by the Korean government (MSIT)

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)212
      • Downloads (Last 6 weeks)13
      Reflects downloads up to 15 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Evaluating the Privacy Valuation of Personal Data on SmartphonesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785098:3(1-33)Online publication date: 9-Sep-2024
      • (2024)Wearable Activity Trackers: A Survey on Utility, Privacy, and SecurityACM Computing Surveys10.1145/364509156:7(1-40)Online publication date: 9-Apr-2024
      • (2024)FamilyScope: Visualizing Affective Aspects of Family Social Interactions using Passive Sensor DataProceedings of the ACM on Human-Computer Interaction10.1145/36373348:CSCW1(1-27)Online publication date: 26-Apr-2024
      • (2024)Interrupting for Microlearning: Understanding Perceptions and Interruptibility of Proactive Conversational Microlearning ServicesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642778(1-21)Online publication date: 11-May-2024
      • (2024)Designing a Data-Driven Survey System: Leveraging Participants' Online Data to Personalize SurveysProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642572(1-22)Online publication date: 11-May-2024
      • (2024)Human centered design of AI-powered Digital Therapeutics for stress prevention: Perspectives from multi-stakeholders' workshops about the SHIVA solutionInternet Interventions10.1016/j.invent.2024.10077538(100775)Online publication date: Dec-2024
      • (2023)Examining User Understanding and Perceptions of E-Commerce Data Privacy, Security, and ProtectionConfronting Security and Privacy Challenges in Digital Marketing10.4018/978-1-6684-8958-1.ch008(159-185)Online publication date: 30-Jun-2023
      • (2023)SeRaNDiPProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962527:2(1-38)Online publication date: 12-Jun-2023
      • (2023)Fingerprinting IoT Devices Using Latent Physical Side-ChannelsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962477:2(1-26)Online publication date: 12-Jun-2023
      • (2023)Using Physiological Signals and Machine Learning Algorithms to Measure Attentiveness During Robot-Assisted Social Skills Intervention: A Case Study of Two Children with Autism Spectrum DisorderIEEE Instrumentation & Measurement Magazine10.1109/MIM.2023.1012141226:3(39-45)Online publication date: May-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media